![]() There is a fundamental question that has to be asked when approaching any security requirement: if there is a threat at all. However, there is one thing wrong with this approach to security it demands that you take action no matter what the circumstances, and not based on the threat. Finally, Volume 3 gave guidance and policy on the security of Communications and Information Systems (CIS). Volume 2 was about personnel security policy including the vetting system, line manager responsibility and travel security. ![]() ![]() Volume 1 covered the principles of protective security, the responsibilities of those concerned with applying them, and physical security policy. There was a manual that told you what you had to do: the Joint Service Publication (JSP) 440, the Defence Manual of Security in 3 volumes. I am ex-military, and the application of security in the military was relatively straightforward. Or does it? Let’s take a look at some of the processes that are out there. ![]() But one thing is for certain: one size doesn’t fit all. When it comes to the application of security measures there are many different ways of doing the same thing some mandated, some not, and some based on best practice.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |